Computer Forensics is generally defined as the identification,
acquisition, examination and preservation of Electronically Stored Information (ESI) using
specialized analytical and investigative techniques. These specialized analytical
and investigative techniques constitute a "forensically sound" manner and are
what separates your local IT department and a true computer forensic
An examination which does not follow forensically sound procedures can
destroy evidence, make the results inadmissible in court, and subject the
examiner and the client to legal and monetary penalties. Mishandling ESI is akin to altering a
paper document. Computer Forensics involves the proper handling of ESI at
every step. Computer Forensics is not just copying a hard drive and searching
The worst thing you can do is conduct an examination on your own, or
with your in-house staff, without following proper procedures. For a very cogent
article explaining "The Dangers of Do-It-Yourself Computer Forensics" read the
article with that title by Erik Shirk in the November 2007 issue of Law
Practice Management at http://www.abanet.org/lpm/lpt/articles/tch11071.shtml
At ESI Consulting, we have the experience, education, tools, and ability
to provide computer forensic services in a manner to ensure that your goals are
achieved, namely the development of relevant evidence that is admissible in
court or any other venue. For a more detailed list of some of the computer
forensic services we provide, please visit our forensic services page.
ESI Consulting has a full range of software and tools to acquire, analyze and examine digital data, including:
Cellebrite Touch Ultimate
EnCase (6 & 7)
Internet Evidence Finder
Mount Image Pro
Simple Carver Suite
Tableau Write Blockers
Virtual Forensic Computing
Wiebetech Forensic Ultradock Write Blocker
X1 Social Discovery
Why Conduct a Computer Forensics Examination?
The situations in which a computer forensic examination can help you are endless. Some examples include ·Proof that something existsor does not exist on a drive ·Proof that something was deleted when it should not have been ·Proof that something was or was not sent, received, or copied ·Proof of when something happened, or that something did not happen at a certain time ·Creation of a timeline of user activity to show patterns of activity ·Retrieval of deleted data ·Retrieval of data that was never even saved locally, such as chats or webmail
Visit our Recent Cases page for more information about the wide world of computer forensics and how we can help you.
If you would like more information about ESI Consulting or our computer forensic services, please send us an e-mail, or call us at 407-740-7163.
Copyright 2014 ESI Consulting, Inc. All Rights Reserved.
ESI Consulting, Inc. 965 S Orlando Avenue Winter Park, FL 32789 407-740-7163